Intel, GlobalFoundries and other chipmakers have built massive facilities to manufacture more powerful computer chips. It's all part of a race to prove they can keep pace with Moore's Law.
Security researcher hired by New York Times says an "overwhelming percentage" of hacks originate from a 12-story building in Shanghai associated with the Chinese military.
The Defense Department will be allowed to distribute iPhones and iPads with Apple's iOS 6 to employees, though that doesn't guarantee Apple will actually receive contracts.
Since 1980, the Army has depended on the Abrams for battlefield superiority in combat. As part of Road Trip 2013, CNET's Daniel Terdiman checked out how these battle-tested vehicles are forged.
Now that the FCC's new rules have been published in the Federal Register, a 60-day clock has started for them to take effect. That is, unless USTelecom can stop that.
The secrets to making and selling consumer electronics are spilling -- on purpose -- and that's helping hardware startups succeed.
The Swedish DIY-furniture manufacturer has launched a service that allows users to hold a virtual wedding online.
Commentary: A 2012 law forbids the states' Public Utility Commission from regulating Internet services. But the pending merger of ISPs could allow the opportunity to do just that.
With its new Instagram account, the U.S. Transportation Security Administration shows images of weaponry that people either forgot they had or tried to sneak past airport agents.
AT&T settles with FCC over customer data that was stolen from data centers overseas and used to unlock stolen mobile phones.